Call for Papers
The Computer Security Foundations Symposium is an annual conference for researchers in computer security. CSF seeks papers on foundational aspects of computer security, e.g., formal security models, relationships between security properties and defenses, principled techniques and tools for design and analysis of security mechanisms, as well as their application to practice. While CSF welcomes submissions beyond the topics listed below, the main focus of CSF is foundational security: submissions that lack foundational aspects risk rejection.
New results in computer security are welcome. Possible topics include, but are not limited to: access control, accountability, anonymity, authentication, critical infrastructure security, cryptography, data and system integrity, database security, decidability and complexity, distributed systems, electronic voting, executable content, formal methods and verification, game theory and decision theory, hardware- based security, humans and computer security, information flow, intrusion detection, language-based security, network security, novel insights on attacks, privacy, provenance, resource usage control, security for mobile computing, security models, security protocols, software security, socio-technical security, trust management, usable security, web security.
Special Sessions (NEW)
We strongly encourage papers in three foundational areas of research not traditionally represented at CSF:
- AI & SECURITY (Chairs: Ariel Procaccia & Benjamin Rubinstein.) In recent years, a number of communities overlapping with AI--- notably algorithmic economics and machine learning---have made significant forays into security & privacy. This session aims to collect theoretical viewpoints on security & privacy, particularly from researchers across diverse communities such as those identifying with AAAI/IJCAI, AAMAS, EC, WEIS, ICML, NIPS, COLT, STOC/FOCS, S&P, and CCS (including the AISEC workshop). Papers in the following areas intersecting with information security are highly encouraged to submit to this special session: Economics: Game theory, mechanism design, market design, social choice; Learning: Online learning, robust statistics, adversarial machine learning, privacy-preserving technologies such as differential privacy.
- PRIVACY (Chair: Vitaly Shmatikov.) CSF 2014 will include a special session on privacy foundations and invites submissions on definitions, models, and frameworks for communication and data privacy, principled analysis of deployed or proposed privacy protection mechanisms, and foundational aspects of practical privacy technologies. Submissions investigating connections between privacy law and policy and computer science are especially encouraged.
- USABLE SECURITY (Chair: Lujo Bauer.) It has become accepted that any user-facing security technology or mechanism is unlikely to be secure if it is not usable. Hence, understanding, measuring, and designing for usability are foundational aspects of building secure systems. CSF 2014 encourages submission of papers that describe new results, quantitative or qualitative, in usability as it pertains to security and privacy. Particularly encouraged are papers that focus on foundational aspects of usability, as well as those whose results generalize beyond a specific environment or system.
These papers will be reviewed under the supervision of expert invited session chairs. They will be presented at the conference, and will appear in the CSF proceedings without any distinction from the other papers.
Challenges and Vision Papers
We particularly encourage challenge/vision papers, which may describe open questions and raise fundamental concerns about practical security. Challenges and/or vision papers should typically identify a real world security problem, argue why it raises foundational issues, explain why the currently available and relevant techniques are inadequate for addressing it, and identify foundational challenges that have to be addressed to solve the problem. These papers will be presented at the conference, and will appear in the CSF proceedings without any distinction from the other papers.
Proceedings, published by the IEEE Computer Society Press, will be available at the symposium, and selected papers will be invited for submission to the Journal of Computer Security.
Carnegie Mellon University
IMDEA Software Institute
|Abstract due:||February 4, 2014, 11:59 pm (Eastern Standard Time)|
|Papers due:||February 11, 2014, 11:59 pm (Eastern Standard Time)|
|Author response period:||March 20-21, 2014, ending at 11:59 pm (Eastern Standard Time)|
|Panel proposals due:||March 15, 2014|
|Notification:||April 11, 2014|
|Camera ready:||May 9, 2014|
|Symposium:||July 19 - 22, 2014|
- Martín Abadi
Microsoft Research Silicon Valley & University of California at Santa Cruz
- Michael Backes
Saarland University and Max Planck Institute for Software Systems
- Lujo Bauer
Carnegie Mellon University (Session Chair on Usable Security)
- Bruno Blanchet
- Stephen Chong
- Anupam Datta
Carnegie Mellon University
- Riccardo Focardi
Università Ca' Foscari, Venezia
- Cedric Fournet
- Deepak Garg
Max Planck Institute for Software Systems
- Joshua Guttman
Worcester Polytechnic Institute and The MITRE Corporation
- Michael Hicks
University of Maryland, College Park
- Somesh Jha
University of Wisconsin
- Boris Köpf
IMDEA Software Institute
- Sergio Maffeis
Imperial College London
- John Mitchell
- Benjamin Pierce
University of Pennsylvania
- Ariel Procaccia
Carnegie Mellon University (Session Co-Chair on AI & Security)
- Tamara Rezk
INRIA Sophia Antipolis-Méditerranée
- Benjamin Rubinstein
University of Melbourne (Session Co-Chair on AI & Security)
- Mark Ryan
University of Birmingham
- Andrei Sabelfeld
Chalmers University of Technology
- Vitaly Shmatikov
University of Texas, Austin (Session Chair on Privacy)
- Michael Carl Tschantz
- Bogdan Warinschi
University of Bristol
Paper Submission Instructions
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with published proceedings. Failure to clearly identify any duplication or overlap with other published or submitted papers is ground for rejection without full review.
Papers should be submitted in Portable Document Format (PDF). Papers submitted in a proprietary format such as Microsoft Word cannot be considered. At least one coauthor of each accepted paper is required to attend CSF to present the paper.
Papers must be submitted using the two-column IEEE Proceedings style available for various document preparation systems at the IEEE Conference Publishing Services page. Papers must not be anonymized. Authors should use appropriate keywords from "AI & Security", "Usable Security", "Privacy" and "Challenge/Vision" to indicate that the paper is meant for a special session. All papers should be at most 12 pages long, not counting bibliography and well-marked appendices.
Committee members are not required to read appendices, and so the paper must be intelligible without them. Papers not adhering to the page limits will be rejected without consideration of their merits.
Papers should be submitted using the CSF 2014 submission site. https://www.easychair.org/conferences/?conf=csf2014.
Proposals for panels are welcome. They should be no more than three pages in length, and should include the names of possible panelists and an indication of which of those panelists have confirmed a desire to participate. They should be submitted by email to the program chairs.
Università di Verona, Italy
Max Planck Institute for
Software Systems, Germany
Saarland University, Germany
Download the PDF version